Key strategies for ISO 27001 compliance adoption

In this Help Net Security interview, Robin Long, founder of Kiowa Security, shares insights on how best to approach the implementation of the ISO/IEC 27001 information security standard. Long advises organizations to establish a detailed project roadma… Continue reading Key strategies for ISO 27001 compliance adoption

EU adopts first cybersecurity certification scheme for safer tech

The European Commission adopted the implementing regulation concerning the EU cybersecurity certification scheme on Common Criteria (EUCC). The outcome aligns with the candidate cybersecurity certification scheme on EUCC that ENISA drafted in response … Continue reading EU adopts first cybersecurity certification scheme for safer tech

Balancing cybersecurity with convenience and progress

Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity decision makers and practitioners, according to CompTIA. The state of cybersecu… Continue reading Balancing cybersecurity with convenience and progress

Avoiding domain security risks when taking your business online

Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry Relations at Markmonitor, discusses best practices enterprises should abide by… Continue reading Avoiding domain security risks when taking your business online

The misconceptions preventing wider adoption of digital signatures

In this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses the legal validity of qualified digital signatures, demonstrating their equivalence to handwritten signatures when backed by robust identity verification. Opting for certifi… Continue reading The misconceptions preventing wider adoption of digital signatures

Unrealistic expectations exacerbate the cybersecurity talent shortage

Consumers believe today’s cybersecurity talent shortage is in large part due to limited exposure to the profession and a lack of cybersecurity education and training at a younger age within school systems, according to ThreatX. 90% of consumers polled … Continue reading Unrealistic expectations exacerbate the cybersecurity talent shortage

Is Google Drive compliant with control A.8.15 in ISO 27001:2022? [closed]

Is Google Drive compliant with control A.8.15 in ISO 27001:2022?
As ISO 27001 requirements for logging and monitoring, are Event logging, Log storage, Protection of logs, and Analysis of logs, could I use Google Cloud as it is keeping this… Continue reading Is Google Drive compliant with control A.8.15 in ISO 27001:2022? [closed]

Lifetime Access To This Highly Rated Learning Library is Now $59.99

The International Open Academy has 4/5 stars from 1,000 reviews, and this lifetime membership will empower you to continue learning for years to come. Continue reading Lifetime Access To This Highly Rated Learning Library is Now $59.99

Why cybersecurity is a blue-collar job

Cybersecurity has witnessed exponential growth in recent years, fueled by the increasing sophistication of cyber threats. As the demand for skilled professionals continues to surge, traditional approaches to education and job requirements are being cha… Continue reading Why cybersecurity is a blue-collar job